{"id":64763,"date":"2025-10-29T14:23:33","date_gmt":"2025-10-29T13:23:33","guid":{"rendered":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2.jpg"},"modified":"2025-10-30T09:05:44","modified_gmt":"2025-10-30T08:05:44","slug":"congres-ciberseguretat-2-2","status":"inherit","type":"attachment","link":"https:\/\/www.conselharan.org\/ca\/superem-la-participacio-en-el-ii-congres-de-ciberseguretat-armari-6-celebrat-a-laran\/congres-ciberseguretat-2-2\/","title":{"rendered":"Congr\u00e8s Ciberseguretat 2"},"author":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-scaled.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-300x169.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-300x169.jpg 300w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-1024x576.jpg 1024w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-768x432.jpg 768w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-1536x864.jpg 1536w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-2048x1152.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n "},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":2560,"height":1440,"file":"2025\/10\/Congres-Ciberseguretat-2-scaled.jpg","filesize":770667,"sizes":{"medium":{"file":"Congres-Ciberseguretat-2-300x169.jpg","width":300,"height":169,"filesize":34640,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-300x169.jpg"},"large":{"file":"Congres-Ciberseguretat-2-1024x576.jpg","width":1024,"height":576,"filesize":155539,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-1024x576.jpg"},"thumbnail":{"file":"Congres-Ciberseguretat-2-150x150.jpg","width":150,"height":150,"filesize":26247,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-150x150.jpg"},"medium_large":{"file":"Congres-Ciberseguretat-2-768x432.jpg","width":768,"height":432,"filesize":100476,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-768x432.jpg"},"1536x1536":{"file":"Congres-Ciberseguretat-2-1536x864.jpg","width":1536,"height":864,"filesize":303111,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-1536x864.jpg"},"2048x2048":{"file":"Congres-Ciberseguretat-2-2048x1152.jpg","width":2048,"height":1152,"filesize":499935,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-2048x1152.jpg"},"wt-slider-img":{"file":"Congres-Ciberseguretat-2-640x320.jpg","width":640,"height":320,"filesize":72534,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-640x320.jpg"},"wt-feat-large":{"file":"Congres-Ciberseguretat-2-423x330.jpg","width":423,"height":330,"filesize":58766,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-423x330.jpg"},"wt-cat-img":{"file":"Congres-Ciberseguretat-2-305x175.jpg","width":305,"height":175,"filesize":35328,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-305x175.jpg"},"wt-tile-large":{"file":"Congres-Ciberseguretat-2-270x270.jpg","width":270,"height":270,"filesize":40656,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-270x270.jpg"},"wt-feat-img":{"file":"Congres-Ciberseguretat-2-207x207.jpg","width":207,"height":207,"filesize":32408,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-207x207.jpg"},"wt-medium-thumb":{"file":"Congres-Ciberseguretat-2-75x75.jpg","width":75,"height":75,"filesize":20391,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-75x75.jpg"},"full":{"file":"Congres-Ciberseguretat-2-scaled.jpg","width":2560,"height":1440,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-scaled.jpg"}},"image_meta":{"aperture":"5.6","credit":"","camera":"ILCE-7M2","caption":"","created_timestamp":"1430676668","copyright":"","focal_length":"34","iso":"1600","shutter_speed":"0.025","title":"","orientation":"1","keywords":[]},"original_image":"Congres-Ciberseguretat-2.jpg"},"post":64773,"source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-2-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.conselharan.org\/ca\/wp-json\/wp\/v2\/media\/64763"}],"collection":[{"href":"https:\/\/www.conselharan.org\/ca\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.conselharan.org\/ca\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.conselharan.org\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conselharan.org\/ca\/wp-json\/wp\/v2\/comments?post=64763"}]}}